A Study of Cyber Threats and Security Frameworks in Cloud Computing
No Thumbnail Available
Date
2025
Journal Title
Journal ISSN
Volume Title
Publisher
Chapman and Hall/CR
Abstract
Cloud computing has transformed the way businesses store, manage, and process data, providing unparalleled scalability, flexibility, and cost-effectiveness. However, the growth of cloud technology creates new cybersecurity difficulties and vulnerabilities. This research chapter provides a thorough examination of cyber risks and security frameworks in cloud computing settings. Various sorts of cyber risks, including data breaches, malware, distributed denial of service (DDoS) attacks, insider threats, and misconfigurations, are recognized and examined in the context of cloud computing. Furthermore, this study investigates current security frameworks and best practices for mitigating these vulnerabilities, such as encryption, access restrictions, authentication systems, and monitoring solutions. This study, which synthesizes insights from academic research, industry reports, and real-world case studies, provides valuable insights into the evolving landscape of cyber threats in cloud computing and makes practical recommendations for implementing effective security measures to protect cloud environments.
Description
Cyberology
An Optimized Approach to the Cyber-World
Edited ByMohd. Shahid Husain, Mohammad Faisal, Halima Sadia, Tasneem Ahmed, Saurabh Shukla, Adil Kaleem
Keywords
Computer Science, Engineering & Technology
